Cell Phone CloningCell Phone Cloning
Presented By:Presented By:
GudiaGudia
ContentsContents
 IntroductionIntroduction
 Mobile Phone CloningMobile Phone Cloning
 HistoryHistory
 How cell Phone clonedHow cell Phone cloned
 Types of cloningTypes of cloning
 Process of cloningProcess of cloning
 Detection of cloningDetection of cloning
 Prevention of cloningPrevention of cloning
 Is fixed telephone network safer than mobile phone?Is fixed telephone network safer than mobile phone?
 Examples and figuresExamples and figures
 ImpactImpact
 ConclusionConclusion
IntroductionIntroduction
 So some of the features ofSo some of the features of
mobile communicationmobile communication
make it an targetmake it an target
for criminals.many peoplefor criminals.many people
are not concerned with thatare not concerned with that
wrong use of awrong use of a
phone.basically todayphone.basically today
mobile have big threat ofmobile have big threat of
cloning.cloning.
Mobile Phone CloningMobile Phone Cloning
Mobile Cloning:Mobile Cloning: is copyingis copying
the identity of one mobilethe identity of one mobile
telephone to another. Intelephone to another. In
simple words, while thesimple words, while the
illegal user 'uses' theillegal user 'uses' the
cellphone, the originalcellphone, the original
cellphone user pays for it.cellphone user pays for it.
Mobile Cloning is an easyMobile Cloning is an easy
crime to commit due tocrime to commit due to
the easy availability ofthe easy availability of
the cloning software.the cloning software.
HistoryHistory
 Cell phone cloningCell phone cloning
started withstarted with MotorolaMotorola
"bag""bag" phones andphones and
reached its peak in thereached its peak in the
mid 90'smid 90's with awith a
commonly availablecommonly available
modification for themodification for the
Motorola "brick"Motorola "brick"
phones, such as thephones, such as the
Classic, the UltraClassic, the Ultra
Classic, and the ModelClassic, and the Model
8000.8000.
How Cell Phone ClonedHow Cell Phone Cloned
 Cloning involvedCloning involved modifying or replacing the EPROM inmodifying or replacing the EPROM in
the phone withthe phone with a new chip which would allow you toa new chip which would allow you to
configure an ESN via some software.configure an ESN via some software.
 You would also have to change the MIN.When you hadYou would also have to change the MIN.When you had
successfullysuccessfully changed the ESN/MINchanged the ESN/MIN pair, your phone waspair, your phone was
an effective clone of the other phone.an effective clone of the other phone.
Types of cloningTypes of cloning
Cloning can be divided into following types:-Cloning can be divided into following types:-
 AMPS Cloning(Advanced mobile phone system)AMPS Cloning(Advanced mobile phone system)
 CDMA Cloning(Code Division Multiple Access)CDMA Cloning(Code Division Multiple Access)
 GSM Cloning(GSM Cloning(Global System for MobileGlobal System for Mobile
communication )communication )
AMPS, CDMA, GSM PhonesAMPS, CDMA, GSM Phones
Process of CloningProcess of Cloning
For cloning a Cell Phone there is need to hack the Sim Card ofFor cloning a Cell Phone there is need to hack the Sim Card of
the Cell Phone.the Cell Phone.
Things Required :Things Required :
 Blank SIM Programmable CardsBlank SIM Programmable Cards
 A SIM Firmware WriterA SIM Firmware Writer
 Software For Reading : Woron ScanSoftware For Reading : Woron Scan
Detection of cloningDetection of cloning
 Duplicate DetectionDuplicate Detection

Velocity TrapVelocity Trap
 Usage ProfilingUsage Profiling
 Call CountingCall Counting

PIN CodesPIN Codes
 Difficulty in retrieving voice mail messages.Difficulty in retrieving voice mail messages.
 Incoming call constantly receiving busy signals.Incoming call constantly receiving busy signals.
 Increased bill amount.Increased bill amount.
Prevention of cloningPrevention of cloning
 Preventive measures MOBILE & SIM CLONING Always set
a PIN in the SIM card.
 Always set up security code in the phone.
 Switch to 3G SIM card which are more secured then 2G.
 Don’t store confidential information in phones.
 Min and ESN numbers checked.
 corporate security policy
Is fixed telephone network safer thanIs fixed telephone network safer than
mobile phone?mobile phone?
ExamplesExamples and figuresand figures
 Mohammad Yaseen, alias Monu, allegedly ran an illegalMohammad Yaseen, alias Monu, allegedly ran an illegal
mobile phone exchange racket in New Delhi.mobile phone exchange racket in New Delhi.
 1,301,3000cases of IMEI cloning found in India betweencases of IMEI cloning found in India between 2009-2009-
20122012..
 It affect 750 million users around the world.It affect 750 million users around the world.
 Free software available for sniffing, thrashing and cloning.Free software available for sniffing, thrashing and cloning.
 It process take very less time.It process take very less time.
 Practically no solution.Only prevention.Practically no solution.Only prevention.
 Cloners are nearly impossible to trace.Cloners are nearly impossible to trace.
ImpactImpact
 Mobile phone industry loses millions of dollars .Mobile phone industry loses millions of dollars .
 Used for illegal activitiesUsed for illegal activities ..
 It include drug crimes.It include drug crimes.

Traffickers acquire cloned phonesTraffickers acquire cloned phones
ConclusionConclusion
To conclude, cell phone communication is one of the mostTo conclude, cell phone communication is one of the most
reliable, efficient and widespread. Cloning methodology isreliable, efficient and widespread. Cloning methodology is
widespread and can be implemented easily. Hence, it must bewidespread and can be implemented easily. Hence, it must be
considered that the security system which was implementedconsidered that the security system which was implemented
lately must not be fruitful enough to secure the system inlately must not be fruitful enough to secure the system in
future.future.
Let’s make a crime free WORLDLet’s make a crime free WORLD
THINK POSITIVETHINK POSITIVE

Cell phone cloning

  • 1.
    Cell Phone CloningCellPhone Cloning Presented By:Presented By: GudiaGudia
  • 2.
    ContentsContents  IntroductionIntroduction  MobilePhone CloningMobile Phone Cloning  HistoryHistory  How cell Phone clonedHow cell Phone cloned  Types of cloningTypes of cloning  Process of cloningProcess of cloning  Detection of cloningDetection of cloning  Prevention of cloningPrevention of cloning  Is fixed telephone network safer than mobile phone?Is fixed telephone network safer than mobile phone?  Examples and figuresExamples and figures  ImpactImpact  ConclusionConclusion
  • 3.
    IntroductionIntroduction  So someof the features ofSo some of the features of mobile communicationmobile communication make it an targetmake it an target for criminals.many peoplefor criminals.many people are not concerned with thatare not concerned with that wrong use of awrong use of a phone.basically todayphone.basically today mobile have big threat ofmobile have big threat of cloning.cloning.
  • 4.
    Mobile Phone CloningMobilePhone Cloning Mobile Cloning:Mobile Cloning: is copyingis copying the identity of one mobilethe identity of one mobile telephone to another. Intelephone to another. In simple words, while thesimple words, while the illegal user 'uses' theillegal user 'uses' the cellphone, the originalcellphone, the original cellphone user pays for it.cellphone user pays for it. Mobile Cloning is an easyMobile Cloning is an easy crime to commit due tocrime to commit due to the easy availability ofthe easy availability of the cloning software.the cloning software.
  • 5.
    HistoryHistory  Cell phonecloningCell phone cloning started withstarted with MotorolaMotorola "bag""bag" phones andphones and reached its peak in thereached its peak in the mid 90'smid 90's with awith a commonly availablecommonly available modification for themodification for the Motorola "brick"Motorola "brick" phones, such as thephones, such as the Classic, the UltraClassic, the Ultra Classic, and the ModelClassic, and the Model 8000.8000.
  • 6.
    How Cell PhoneClonedHow Cell Phone Cloned  Cloning involvedCloning involved modifying or replacing the EPROM inmodifying or replacing the EPROM in the phone withthe phone with a new chip which would allow you toa new chip which would allow you to configure an ESN via some software.configure an ESN via some software.  You would also have to change the MIN.When you hadYou would also have to change the MIN.When you had successfullysuccessfully changed the ESN/MINchanged the ESN/MIN pair, your phone waspair, your phone was an effective clone of the other phone.an effective clone of the other phone.
  • 8.
    Types of cloningTypesof cloning Cloning can be divided into following types:-Cloning can be divided into following types:-  AMPS Cloning(Advanced mobile phone system)AMPS Cloning(Advanced mobile phone system)  CDMA Cloning(Code Division Multiple Access)CDMA Cloning(Code Division Multiple Access)  GSM Cloning(GSM Cloning(Global System for MobileGlobal System for Mobile communication )communication )
  • 9.
    AMPS, CDMA, GSMPhonesAMPS, CDMA, GSM Phones
  • 10.
    Process of CloningProcessof Cloning For cloning a Cell Phone there is need to hack the Sim Card ofFor cloning a Cell Phone there is need to hack the Sim Card of the Cell Phone.the Cell Phone. Things Required :Things Required :  Blank SIM Programmable CardsBlank SIM Programmable Cards  A SIM Firmware WriterA SIM Firmware Writer  Software For Reading : Woron ScanSoftware For Reading : Woron Scan
  • 11.
    Detection of cloningDetectionof cloning  Duplicate DetectionDuplicate Detection  Velocity TrapVelocity Trap  Usage ProfilingUsage Profiling  Call CountingCall Counting  PIN CodesPIN Codes  Difficulty in retrieving voice mail messages.Difficulty in retrieving voice mail messages.  Incoming call constantly receiving busy signals.Incoming call constantly receiving busy signals.  Increased bill amount.Increased bill amount.
  • 12.
    Prevention of cloningPreventionof cloning  Preventive measures MOBILE & SIM CLONING Always set a PIN in the SIM card.  Always set up security code in the phone.  Switch to 3G SIM card which are more secured then 2G.  Don’t store confidential information in phones.  Min and ESN numbers checked.  corporate security policy
  • 13.
    Is fixed telephonenetwork safer thanIs fixed telephone network safer than mobile phone?mobile phone?
  • 14.
    ExamplesExamples and figuresandfigures  Mohammad Yaseen, alias Monu, allegedly ran an illegalMohammad Yaseen, alias Monu, allegedly ran an illegal mobile phone exchange racket in New Delhi.mobile phone exchange racket in New Delhi.  1,301,3000cases of IMEI cloning found in India betweencases of IMEI cloning found in India between 2009-2009- 20122012..  It affect 750 million users around the world.It affect 750 million users around the world.  Free software available for sniffing, thrashing and cloning.Free software available for sniffing, thrashing and cloning.  It process take very less time.It process take very less time.  Practically no solution.Only prevention.Practically no solution.Only prevention.  Cloners are nearly impossible to trace.Cloners are nearly impossible to trace.
  • 15.
    ImpactImpact  Mobile phoneindustry loses millions of dollars .Mobile phone industry loses millions of dollars .  Used for illegal activitiesUsed for illegal activities ..  It include drug crimes.It include drug crimes.  Traffickers acquire cloned phonesTraffickers acquire cloned phones
  • 16.
    ConclusionConclusion To conclude, cellphone communication is one of the mostTo conclude, cell phone communication is one of the most reliable, efficient and widespread. Cloning methodology isreliable, efficient and widespread. Cloning methodology is widespread and can be implemented easily. Hence, it must bewidespread and can be implemented easily. Hence, it must be considered that the security system which was implementedconsidered that the security system which was implemented lately must not be fruitful enough to secure the system inlately must not be fruitful enough to secure the system in future.future.
  • 18.
    Let’s make acrime free WORLDLet’s make a crime free WORLD THINK POSITIVETHINK POSITIVE